AU5457699A - A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy - Google Patents
A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copyInfo
- Publication number
- AU5457699A AU5457699A AU54576/99A AU5457699A AU5457699A AU 5457699 A AU5457699 A AU 5457699A AU 54576/99 A AU54576/99 A AU 54576/99A AU 5457699 A AU5457699 A AU 5457699A AU 5457699 A AU5457699 A AU 5457699A
- Authority
- AU
- Australia
- Prior art keywords
- signature
- key
- message
- technique
- authentic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
Abstract
A technique for generating, for a given message to be signed, an authentic cryptographic signature that can be authenticated, by a recipient of the signed message, as having originated from a signor of the message; and appropriately authenticating such a signature. Specifically, this technique, given a message, such as, e.g., a numerical product copy identifier (83, 93), forms an authentic signature (87, 97), based on public-key cryptosystem, through use of generator value selected from points on an elliptic curve over a finite field. The authentic signature is generated using the generator value in conjunction with three keys; namely, a public key, a private key and a secret key, and thus substantially increases the security associated with cryptographic signatures generated through a conventional two-key public-key cryptosystem. A unique product copy indicia can be formed by concatenating the identifier, for a given product copy, with its corresponding authentic signature. During subsequent user installation of that copy to a computer (200), the user enters the indicia when prompted by execution of an installation program which, in turn, privately authenticates the signature contained in the indicia in order to continue or prematurely terminate the installation.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09102948 | 1998-06-23 | ||
US09102851 | 1998-06-23 | ||
US09/102,948 US6209093B1 (en) | 1998-06-23 | 1998-06-23 | Technique for producing a privately authenticatable product copy indicia and for authenticating such an indicia |
US09/102,851 US6163841A (en) | 1998-06-23 | 1998-06-23 | Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures |
PCT/US1999/014215 WO1999067920A1 (en) | 1998-06-23 | 1999-06-23 | A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy |
Publications (1)
Publication Number | Publication Date |
---|---|
AU5457699A true AU5457699A (en) | 2000-01-10 |
Family
ID=26799803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU54576/99A Abandoned AU5457699A (en) | 1998-06-23 | 1999-06-23 | A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1088420B1 (en) |
JP (1) | JP4644368B2 (en) |
CN (2) | CN1264305C (en) |
AT (1) | ATE361605T1 (en) |
AU (1) | AU5457699A (en) |
DE (1) | DE69935980T2 (en) |
WO (1) | WO1999067920A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103081398B (en) * | 2010-03-31 | 2016-04-06 | 爱迪德技术有限公司 | For the protection of the system and method that password assets are attacked from white box |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5271061A (en) * | 1991-09-17 | 1993-12-14 | Next Computer, Inc. | Method and apparatus for public key exchange in a cryptographic system |
JP2868104B2 (en) * | 1992-07-27 | 1999-03-10 | 日本電信電話株式会社 | Digital signature method based on elliptic curve, signer device and verifier device |
US5299262A (en) * | 1992-08-13 | 1994-03-29 | The United States Of America As Represented By The United States Department Of Energy | Method for exponentiating in cryptographic systems |
JP3540477B2 (en) * | 1995-12-13 | 2004-07-07 | 松下電器産業株式会社 | Signature scheme |
US5638447A (en) * | 1996-05-15 | 1997-06-10 | Micali; Silvio | Compact digital signatures |
US5737424A (en) * | 1996-06-04 | 1998-04-07 | Software Security, Inc. | Method and system for secure distribution of protected data using elliptic curve systems |
US6279110B1 (en) * | 1997-11-10 | 2001-08-21 | Certicom Corporation | Masked digital signatures |
-
1999
- 1999-06-23 EP EP99940794A patent/EP1088420B1/en not_active Expired - Lifetime
- 1999-06-23 CN CN99807748.8A patent/CN1264305C/en not_active Expired - Fee Related
- 1999-06-23 AT AT99940794T patent/ATE361605T1/en not_active IP Right Cessation
- 1999-06-23 JP JP2000556476A patent/JP4644368B2/en not_active Expired - Fee Related
- 1999-06-23 DE DE69935980T patent/DE69935980T2/en not_active Expired - Lifetime
- 1999-06-23 WO PCT/US1999/014215 patent/WO1999067920A1/en active IP Right Grant
- 1999-06-23 AU AU54576/99A patent/AU5457699A/en not_active Abandoned
- 1999-06-23 CN CNB2004100325917A patent/CN100334831C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
JP4644368B2 (en) | 2011-03-02 |
CN1534922A (en) | 2004-10-06 |
WO1999067920A1 (en) | 1999-12-29 |
DE69935980D1 (en) | 2007-06-14 |
DE69935980T2 (en) | 2008-01-10 |
EP1088420A1 (en) | 2001-04-04 |
EP1088420B1 (en) | 2007-05-02 |
CN1306714A (en) | 2001-08-01 |
CN1264305C (en) | 2006-07-12 |
JP2002519723A (en) | 2002-07-02 |
ATE361605T1 (en) | 2007-05-15 |
CN100334831C (en) | 2007-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9503261B2 (en) | Public key encryption with digital signature scheme | |
ATE211870T1 (en) | SECRET KEY CERTIFICATES | |
MX9602773A (en) | Cryptographic system and method with key escrow feature. | |
US20070199071A1 (en) | Apparatus and method for identity-based encryption within a conventional public-key infrastructure | |
IL139520A0 (en) | Efficient distributed rsa key generation | |
WO2007027241A3 (en) | Multi-key cryptographically generated address | |
HUP0002700A3 (en) | Auto-recoverable auto-certifiable cryptosystems | |
TWI268688B (en) | System and method for acoustic two factor authentication | |
WO1996034473A3 (en) | A multi-purpose high speed cryptographically secure sequence generator based on zeta one-way functions | |
JPH07191602A (en) | Electronic autographing method and device | |
AU3144101A (en) | Consumable authentication protocol and system | |
WO2002013445A3 (en) | Linking public key of device to information during manufacture | |
MY118736A (en) | Scheme for authentication of at least one prover by a verifier | |
GB2342022A (en) | Split-key cryptographic system and method | |
AU2003264906A1 (en) | System and method for guaranteeing software integrity | |
WO2001084766A3 (en) | System and method for encryption using transparent keys | |
Joye et al. | Identity-based signatures | |
KR100396740B1 (en) | Provably secure public key encryption scheme based on computational diffie-hellman assumption | |
AU5457699A (en) | A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy | |
EP0973293A3 (en) | Public-key cryptography with increased protection against selective ciphertext attack | |
AU2422499A (en) | Key management system | |
EP1944906A3 (en) | Robust efficient distributed RSA-key generation | |
KR100698514B1 (en) | A procesing method and a computer program product effective CRL | |
CA2541728C (en) | Public key encryption with digital signature scheme | |
KR100412540B1 (en) | Security system having a certificate revocation mechanisim |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |